0% found this document useful (0 votes)
13 views9 pages

Network Security

Network security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
13 views9 pages

Network Security

Network security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 9
Of your | te tages 8 _uodely of threat 24 TE SEIS Hert from entering or _gprendigg on on noe vork Security, Tei any acty deal to __ | __Effective network —Seewilly vamages acces to tht nttoork- Nebdovts Security Combines rutfpbe Layirs af deporses ot te edge fa fa Network» pices and Controls + Aatoriced L4en Qain Quct to cs AUWOYK YeACWIUA , but Malicious actors Qu blocked feo caring out exploits and threats - Digitization has transformed ow world - How We Live work, play ord Learn have cll changed : Blew Orgenizaty phar Wd) to deter tre cowlus that astoner and enployes derand must protect its netdork- Networks Sewusiltg abbo helps yeu protect proprietary, infortatton fron astnrek s “[ynimately HF proteots Your repulsion Types Network Seowtity 3— |_Fivewnts 2 Hr pub up a bandon hw your fruted internal networs, ancl untrusted outside Network.» Such Os tH Tatennet« Wy wae acetal defined Teacher's Signature sass Goh nenaorr Seouity fogs | mplonerds | sxperiment NO Date objective | | uly +: teal oH Eo ane ays qu au hi -nwonber_ ong “threat wy - _Veetor Seturity breach Pittackor, use | personal Information and —_Locial Cegineering tactles to build oe earipatgrs “fo_deceve veciplents and hem jo cide (aie on wane 3) T Arti Virus and Antl-makden Sofrdou s- Maludare Short fr Naliclous Sattar tnoludes vires , weress, Trefand » Renkomdort _, and Spydore Sometines malDere wil tnfect—a nitwon< but Ve dloretent™ fr ley or ever ierka. yy Networe Segrentation s— Sofrderu defined seg nie nation nasoork traffic Mo cifferen clarsifieation are based on fe endpolt Hlertitys Not Mer IP cx clelvessed Y Acces Gntrolg- Not evew vse 2 fetus and netJork- deb Securify $A Web Ceurtity soln colt contro yout StF “WE b Use) block web-based frrcods and deny acca to Habicioud Websited + Pett protec youre we. got ane Site om 6A tHe Chouol + Wirelems Seourity s- Wireleas nebords QU not 24 seat C4 wire on. Without Stiggert Geowwity Measwua 1 ingtalung a otrebess Laat Can be KL pss) Eronet _ ports ewer shou, Incbacing Ki De esiisee cease eee Teacher's Signature sssseresneeens an aie f0,9ein waubrisel decors fo cn vs nesunth with Me pbjetve of creabey dete om perfor ey Sr c= SEA Ee coc fea enor’, Laks ‘| Pomsive 8 Alitackers som _qccons fo Networs and Can Monitor a Ma FY or Steal senate Infomation, but withouk MAKING any chang +b te dase, heawiag IF iotact * Actves- Attackers Nor anty gain unautheized exces ut alo Nodify cata, ether cleleting encrypts or ofhemolse hasining TH We distinguish _attdors Qacks from Savral oun types CUtas 8— + Senveds of ent pots, typically Contpro ssiciag At with Malwant+ sfart_by Inpeng Rent Endpoint Attachs 8 Gasnin unauthorized Actes fDuderrt detors ) ae ee rabworu (Mesos 3 Thfeeting [7 vesouriees with Nolan alloising attacked +0 Compyomisg oyster grea dara ancl do dauare. They also includ & — sanson art _ALtAOKS « ms eer ince Cerone roerrenrenees Teacher's Signature Vusnenabisitics Eiplaits and ftttaona 8— Exploiting yednerablli Hes i | cofmoane sel In “fa organization fo.gan _unastherizedl queens / J COMPTOM'ge ar Subotd9e Sysleny- —— een “ Poulsient Attoors 2 “Tine om Conpler put Laqorurl thieots, ustich include mutase fe OHA bet cudo etka types- a | na network attack, anakes are foased on peusrating I corporate nendors petimaer and Ganiog accers to mkema systeis- Yory often , once Insite akacken Ul Combine other types ef attacks, sor ee Cass prerttsng) On endpoint , Spreading Mal oarn or _enpliting a Valu obit Ina Spe volthin AL quwor R- “rots af. tot 1s Cyptegraghy 2 Eipfom coh ire Typed “[Hovolue yaing compler — Madhentatica eu AUR Cr tg encom ity o 0 fore kro Re cipher took 1S encrypt re [Ricerspticon kee ron nota new ned concep = Soph histheasech ME » of ntwus far Sever eudlennia- for —~ 1} dase ealsteol tn sed cling infortation > n to 6 cect it Od pres al goritht can't be | reach FP gphtaticard wettede of Nay nfire vadous — dultwus brome, crypto back Fo anclert rpss Methelh Con be tracked | eee tans ane “Phen use Gf At eno ety pries ty _proted= Cacreol text. raphy 2 eae y Syeimtetrie. ography §— [HS also Known as Cecret Key encryption 1 uses ashe for the eohole proc. “Thu sender ond vecleven Lye the keg J pt ond decrypt a Menage nos to (a4 fp prsteck pmeaning ti Key hag “fo be Securuy Chas eof ops Hem. 1 Cryptography 8— Alan called Public key ceyphagrys 1S often Conslcled eal A Seow. seeeietenengtoe gxperiment NO-« | one to _encry | rae ea Information “and fis Indegring «Arner Be ft SEE GOA deteypr data Baik eg as Telared= go no PA one the ofan do deerypt it~ TES Chpheraphic algerie ued sr peteg, funetion eneeypts informatie wang the com phex Mothentatical Ag erithey ant Precduyes « ualgut string of Chonacters, Cec pea to tra dotq- Thy String is Knoda a4 hosh Vel pusnich Fg Usiqut for eath menaee + Ber 74 sig tear Changs ¢y TH 0 par Wot Feautttn Anyone wolut + Que-4 Define Authentication and its types fn_nenoare Security 2 Authentication Ic fhe poo 0} verifigng Ae “Wetity Qf & L401 or inforteaten. User authentication $s th proms of volfying Kt ideaiiy gf a wer whan thar wer fo9) into a computer Sate. TRaw aippoutt types 4 quathent cat agvien uch ay g— aa Singlt Factor Authentication s- [tudes th fish Heed of ceouity Hat wes qfevetoped on TNS authentioatin system , Rx user hos to ent Ah wyenneerrared TH paydend te confi ubethir rat user 16 Aosging or Not: Aoi f FH Ldtrname or pondrel |_ is covery » hen fh usr WI ot be allowed to login er _accen iA Teacher's Signature ....... Experiment Ni Objective eat Oureesrterte Date «0+. “Tero factor authentication $- Paths aushenti cater syaten, $c wer hos to Gea Uaewnens , poricdore cad often fortes, | Tae an varlon typ of 2{ _Quilertfeadt on Ayden fRat-au umd b4 1H tasur_fir Seunloy He gygien « Sime of ten ore _ pire toners ead virtual PREU-, OTP and more. cy Huts factor Audherticatin Thats tye. custherfitaton , mort Hen ont pacer 4 cuutherttaren i neice d: THis gives besten. Cewuity toh users ey bs te of kexteggen_or phishing ebook. will not be TPasib Mull focker Authertitaten gatem. Teg Ouwus The ann, That tet Infertation wile rol Get-stoten Quis Define Des algorithms fre them - | DES stands for_Dala_frersptien Stendard. Thuwau certain Madints phatton be Udtel to crack ta DES algeritha. The DES _alyorth as a _Key Bf 50 bitsiee + Wseng this tee Fe 06S taka a Block of 64 bik pln tect a tnput Qnd Geriratts 4 bbocis af bit cipher tect “he pes procs has several shep¢ tavelocdl in it, Whur each step ts cabltd a oun al Depending ie the sla gy Be Key aed , the nwnben ef veurds varyes « for exan a 2% bit I< —ccequires |b round La 132 4h key wequrty jr. rounds and 40 on. Teacher's Signature .....

You might also like